<p>From smartwatches to smart streetlights, smart home devices to smart manufacturing, the internet of things has revolutionized how people and organizations operate, improving efficiencies and optimizing processes.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>With these <a href=”https://www.techtarget.com/iotagenda/tip/Top-advantages-and-disadvantages-of-IoT-in-business”>benefits</a>, however, comes a major challenge: <a href=”https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT”>IoT</a> increases the number and types of security risks businesses and consumers face. Any device that connects to the internet is a potential entry point to the larger network and the sensitive data it contains. IoT-related cyberattacks could be detrimental to a business or, in some cases, life-threatening or deadly.</p>
<p>Here are 11 of the many inherent IoT security challenges and how to mitigate them.</p>
<section class=”section main-article-chapter” data-menu-title=”1. Expanding attack surface”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>1. Expanding attack surface</h2>
<p><b>Challenge:</b> The sheer number, variety and complexity of <a href=”https://www.techtarget.com/iotagenda/definition/IoT-device”>IoT devices</a> create a vast attack surface for security teams to manage and secure. Yet, as one of the oldest security adages goes, “You can’t protect what you can’t see.” This is especially true in the case of IoT, with small <a href=”https://www.techtarget.com/iotagenda/definition/smart-sensor”>sensors</a> and little internet-enabled devices deployed across networks and geographies that often lack oversight and management. Without proper visibility into what devices are connecting to their networks — a problem known as <i><a href=”https://www.techtarget.com/searchcloudcomputing/definition/shadow-IT-shadow-information-technology”>shadow IT</a></i> — organizations are subject to unauthorized access, data loss, attacks and operational disruptions.</p>
<p><b>Solution:</b></p>
<ul class=”default-list”>
&l
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: